Page 6 of 26 results (0.004 seconds)

CVSS: 7.5EPSS: 3%CPEs: 21EXPL: 0

The default configuration in OpenAFS 1.4.x before 1.4.4 and 1.5.x before 1.5.17 supports setuid programs within the local cell, which might allow attackers to gain privileges by spoofing a response to an AFS cache manager FetchStatus request, and setting setuid and root ownership for files in the cache. La configuración predeterminada en OpenAFS versiones 1.4.x anteriores a 1.4.4 y versiones 1.5.x anteriores a 1.5.17, admite programas setuid dentro de la celda local, lo que podría permitir a atacantes alcanzar privilegios suplantando una respuesta a una petición FetchStatus del administrador de caché AFS y establecer la propiedad de setuid y root para archivos en la memoria caché. • http://secunia.com/advisories/24582 http://secunia.com/advisories/24599 http://secunia.com/advisories/24607 http://secunia.com/advisories/24720 http://security.gentoo.org/glsa/glsa-200704-03.xml http://www.debian.org/security/2007/dsa-1271 http://www.mandriva.com/security/advisories?name=MDKSA-2007:066 http://www.openafs.org/pipermail/openafs-announce/2007/000185.html http://www.openafs.org/pipermail/openafs-announce/2007/000186.html http://www.openafs.org/pipermail/openafs-anno • CWE-16: Configuration •